Vulnerability CVE-2013-7259


Published: 2014-04-29

Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in Neo4J 1.9.2 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary code, as demonstrated by a request to (1) db/data/ext/GremlinPlugin/graphdb/execute_script or (2) db/manage/server/console/.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Neo4J Server Cross Site Request Forgery
Arun Neelicattu
03.01.2014

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Neo4j -> Neo4j 

 References:
https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j
http://www.openwall.com/lists/oss-security/2014/01/03/8
http://www.openwall.com/lists/oss-security/2014/01/03/3
http://blog.diniscruz.com/2013/08/neo4j-csrf-payload-to-start-processes.html

Copyright 2024, cxsecurity.com

 

Back to Top